Publications

Publications in 2020

Filter by Year: All, 2021, 2020, 2019, 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008,
Filter by Type: All, Book, Article, Chapter, Conference Proceedings, Edited Conference Proceedings, Master Thesis, Bachelor Thesis, Technical Report, Miscellaneous,
Filter by Language: All, English, German,

    2020

    • Timo Häckel, Anja Schmidt, Philipp Meyer, Franz Korf, and Thomas C. Schmidt. Strategies for Integrating Controls Flows in Software-Defined In-Vehicle Networks and Their Impact on Network Security. In: 2020 IEEE Vehicular Networking Conference (VNC) (IEEE VNC 2020). Piscataway, NJ, USA, Dec. 2020, IEEE Press,
      [Abstract], [DOI], [Bibtex]

      Current In-Vehicle Networks (IVNs) connect Electronic Control Units (ECUs) via domain busses. A gateway forwards messages between these domains. Automotive Ethernet emerges as a flat, high-speed backbone technology for IVNs that carries the various control flows within Ethernet frames. Recently, Software-Defined Networking (SDN) has been identified as a useful building block of the vehicular domain, as it allows the differentiation of packets based on all header fields and thus can isolate unrelated control flows. In this work, we systematically explore the different strategies for integrating automotive control flows in switched Ether-networks and analyze their security impact for a software-defined IVN. We discuss how control flow identifiers can be embedded on different layers resulting in a range of solutions from fully exposed embedding to deep encapsulation. We evaluate these strategies in a realistic IVN based on the communication matrix of a production grade vehicle, which we map into a modern Ethernet topology. We find that visibility of automotive control flows within packet headers is essential for the network infrastructure to enable isolation and access control. With an exposed embedding, the SDN backbone can establish and survey trust zones within the IVN and largely reduce the attack surface of connected cars. An exposed embedding strategy also minimizes communication expenses.

      @InProceedings{   hsmks-sicfs-20,
        author        = {Timo H{\"a}ckel and Anja Schmidt and Philipp Meyer and
                        Franz Korf and Thomas C. Schmidt},
        title         = {{Strategies for Integrating Controls Flows in
                        Software-Defined In-Vehicle Networks and Their Impact on
                        Network Security}},
        booktitle     = {2020 IEEE Vehicular Networking Conference (VNC) (IEEE VNC
                        2020)},
        location      = {Online},
        month         = dec,
        year          = 2020,
        publisher     = {IEEE Press},
        address       = {Piscataway, NJ, USA},
        doi           = {10.1109/VNC51378.2020.9318372},
        abstract      = {Current In-Vehicle Networks (IVNs) connect Electronic
                        Control Units (ECUs) via domain busses. A gateway forwards
                        messages between these domains. Automotive Ethernet emerges
                        as a flat, high-speed backbone technology for IVNs that
                        carries the various control flows within Ethernet frames.
                        Recently, Software-Defined Networking (SDN) has been
                        identified as a useful building block of the vehicular
                        domain, as it allows the differentiation of packets based
                        on all header fields and thus can isolate unrelated control
                        flows. In this work, we systematically explore the
                        different strategies for integrating automotive control
                        flows in switched Ether-networks and analyze their security
                        impact for a software-defined IVN. We discuss how control
                        flow identifiers can be embedded on different layers
                        resulting in a range of solutions from fully exposed
                        embedding to deep encapsulation. We evaluate these
                        strategies in a realistic IVN based on the communication
                        matrix of a production grade vehicle, which we map into a
                        modern Ethernet topology. We find that visibility of
                        automotive control flows within packet headers is essential
                        for the network infrastructure to enable isolation and
                        access control. With an exposed embedding, the SDN backbone
                        can establish and survey trust zones within the IVN and
                        largely reduce the attack surface of connected cars. An
                        exposed embedding strategy also minimizes communication
                        expenses.},
        groups        = {own, sdn, publications, security}
      }
    • Philipp Meyer, Timo Häckel, Falk Langer, Lukas Stahlbock, Jochen Decker, Sebastian A. Eckhardt, Franz Korf, Thomas C. Schmidt, and Fabian Schüppel. Demo: A Security Infrastructure for Vehicular Information Using SDN, Intrusion Detection, and a Defense Center in the Cloud. In: 2020 IEEE Vehicular Networking Conference (VNC) (IEEE VNC 2020). Piscataway, NJ, USA, Dec. 2020, IEEE Press,
      [Abstract], [DOI], [Bibtex]

      Vehicular on-board communication is the basis for advanced driver assistance, autonomous driving, over-the-air updates, and many more. If unprotected, this infrastructure is vulnerable to manipulation and various attacks. As any networked system, future connected cars require robust protection, monitoring, and incidence management against cyber-attacks during their lifetime. We demonstrate an infrastructure that secures the in-vehicle communication system and enables the security management of an entire vehicle fleet. Our prototype - a real-world production car - uses an Ethernet backbone network. It implements protective measures using software-defined networking, anomaly detection technologies, and is connected to a cyber defense center in the cloud. We demonstrate how this combination can reliably detect and mitigate common attacks on the vehicle - including its legacy components.

      @InProceedings{   mhlsd-dsivi-20,
        author        = {Philipp Meyer and Timo H{\"a}ckel and Falk Langer and
                        Lukas Stahlbock and Jochen Decker and Sebastian A. Eckhardt
                        and Franz Korf and Thomas C. Schmidt and Fabian
                        Sch{\"u}ppel},
        title         = {{Demo: A Security Infrastructure for Vehicular Information
                        Using {SDN,} Intrusion Detection, and a Defense Center in
                        the Cloud}},
        booktitle     = {2020 IEEE Vehicular Networking Conference (VNC) (IEEE VNC
                        2020)},
        location      = {Online},
        month         = dec,
        year          = 2020,
        publisher     = {IEEE Press},
        address       = {Piscataway, NJ, USA},
        doi           = {10.1109/VNC51378.2020.9318351},
        abstract      = {Vehicular on-board communication is the basis for advanced
                        driver assistance, autonomous driving, over-the-air
                        updates, and many more. If unprotected, this infrastructure
                        is vulnerable to manipulation and various attacks. As any
                        networked system, future connected cars require robust
                        protection, monitoring, and incidence management against
                        cyber-attacks during their lifetime. We demonstrate an
                        infrastructure that secures the in-vehicle communication
                        system and enables the security management of an entire
                        vehicle fleet. Our prototype - a real-world production car
                        - uses an Ethernet backbone network. It implements
                        protective measures using software-defined networking,
                        anomaly detection technologies, and is connected to a cyber
                        defense center in the cloud. We demonstrate how this
                        combination can reliably detect and mitigate common attacks
                        on the vehicle - including its legacy components.},
        groups        = {own, sdn, publications, security, anomaly-detection}
      }
    • Randolf Rotermund, Timo Häckel, Philipp Meyer, Franz Korf, and Thomas C. Schmidt. Requirements Analysis and Performance Evaluation of SDN Controllers for Automotive Use Cases. In: 2020 IEEE Vehicular Networking Conference (VNC) (IEEE VNC 2020). Piscataway, NJ, USA, Dec. 2020, IEEE Press,
      [Abstract], [Slides (pdf)], [DOI], [Bibtex]

      Future vehicles will be more connected than ever leading to increased dynamics in vehicle on-board networks. Software-Defined Networking (SDN) is a promising technology to meet the emerging needs for flexibility and security in future automotive use cases. Although SDN controllers have been evaluated in data center networks, to the best of our knowledge there is a lack of an analysis and performance evaluation of SDN controllers for automotive use cases. In this work we provide a detailed requirements analysis for the use of SDN controllers in cars. Based on this requirements analysis we choose existing controller implementations for a performance analysis. Finally, we analyze automotive specific use cases for SDN controllers with controller application examples and show how these can fulfill additional requirements. Our evaluation provides a helpful basis for the design and development of SDN controllers that can be used in vehicles.

      @InProceedings{   rhmks-rapesc-20,
        author        = {Randolf Rotermund and Timo H{\"a}ckel and Philipp Meyer
                        and Franz Korf and Thomas C. Schmidt},
        title         = {{Requirements Analysis and Performance Evaluation of {SDN}
                        Controllers for Automotive Use Cases}},
        booktitle     = {2020 IEEE Vehicular Networking Conference (VNC) (IEEE VNC
                        2020)},
        location      = {Online},
        month         = dec,
        year          = 2020,
        publisher     = {IEEE Press},
        address       = {Piscataway, NJ, USA},
        doi           = {10.1109/VNC51378.2020.9318378},
        abstract      = {Future vehicles will be more connected than ever leading
                        to increased dynamics in vehicle on-board networks.
                        Software-Defined Networking (SDN) is a promising technology
                        to meet the emerging needs for flexibility and security in
                        future automotive use cases. Although SDN controllers have
                        been evaluated in data center networks, to the best of our
                        knowledge there is a lack of an analysis and performance
                        evaluation of SDN controllers for automotive use cases. In
                        this work we provide a detailed requirements analysis for
                        the use of SDN controllers in cars. Based on this
                        requirements analysis we choose existing controller
                        implementations for a performance analysis. Finally, we
                        analyze automotive specific use cases for SDN controllers
                        with controller application examples and show how these can
                        fulfill additional requirements. Our evaluation provides a
                        helpful basis for the design and development of SDN
                        controllers that can be used in vehicles.},
        groups        = {own, sdn, automotive, performance-analysis, publications}
      }
    • Philipp Meyer, Timo Häckel, Franz Korf, and Thomas C. Schmidt. Network Anomaly Detection in Cars based on Time-Sensitive Ingress Control. In: 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall). Pages 1—5, Piscataway, NJ, USA, Nov. 2020, IEEE Press,
      [Abstract], [Fulltext Document (pdf)], [Slides (pdf)], [DOI], [Bibtex]

      Connected cars need robust protection against network attacks. Network anomaly detection and prevention on board will be particularly fast and reliable when situated on the lowest possible layer. Blocking traffic on a low layer, however, causes severe harm if triggered erroneously by falsely positive alarms. In this paper, we introduce and evaluate a concept for detecting anomalous traffic using the ingress control of Time-Sensitive Networking (TSN). We build on the idea that already defined TSN traffic descriptors for in-car network configurations are rigorous, and hence any observed violation should not be a false positive. Also, we use Software-Defined Networking (SDN) technologies to collect and evaluate ingress anomaly reports, to identify the generating flows, and to ban them from the network. We evaluate our concept by simulating a real-world zonal network topology of a future car. Our findings confirm that abnormally behaving individual flows can indeed be reliably segregated with zero false positives.

      @InProceedings{   mhks-nadci-20,
        author        = {Philipp Meyer and Timo H{\"a}ckel and Franz Korf and
                        Thomas C. Schmidt},
        title         = {{Network Anomaly Detection in Cars based on Time-Sensitive
                        Ingress Control}},
        booktitle     = {2020 IEEE 92nd Vehicular Technology Conference
                        (VTC2020-Fall)},
        location      = {Online},
        month         = nov,
        year          = 2020,
        pages         = {1--5},
        publisher     = {IEEE Press},
        address       = {Piscataway, NJ, USA},
        doi           = {10.1109/VTC2020-Fall49728.2020.9348746},
        abstract      = {Connected cars need robust protection against network
                        attacks. Network anomaly detection and prevention on board
                        will be particularly fast and reliable when situated on the
                        lowest possible layer. Blocking traffic on a low layer,
                        however, causes severe harm if triggered erroneously by
                        falsely positive alarms. In this paper, we introduce and
                        evaluate a concept for detecting anomalous traffic using
                        the ingress control of Time-Sensitive Networking (TSN). We
                        build on the idea that already defined TSN traffic
                        descriptors for in-car network configurations are rigorous,
                        and hence any observed violation should not be a false
                        positive. Also, we use Software-Defined Networking (SDN)
                        technologies to collect and evaluate ingress anomaly
                        reports, to identify the generating flows, and to ban them
                        from the network. We evaluate our concept by simulating a
                        real-world zonal network topology of a future car. Our
                        findings confirm that abnormally behaving individual flows
                        can indeed be reliably segregated with zero false
                        positives.},
        groups        = {own, publications, simulation, tsn, security, sdn,
                        anomaly-detection},
        langid        = {english}
      }
    • Mehmet Cakir. Simulation-Based Evaluation of a Delay-Based Forwarding Concept. Oct. 2020, Talk.
      [Abstract], [Fulltext Document (pdf)], [Slides (pdf)], [Bibtex]

      Quality-of-Service (QoS) mechanisms can prioritize a particular network flow with IntServ. Clemm and Eckert propose Latency-Based Forwarding (LBF) as a novel approach to provide support for high-precision latency objectives. It prioritizes traffic with introducing packet metadata which carries latency objectives. With that metadata different actions will be taken at network nodes. A Proof-of-Concept has been developed using Big Packet Protocol (BPP). So in contrast to IntServ LBF supports prioritizing specific packets. The purpose is to provide fairness among different applications. For example packets that aren't urgent as others can be chosen sent later as the urgent ones. Clemm and Eckert contacted us to enable further investigations for the LBF mechanism with OMNeT++. We want to compare our simulation results to the emulation results. The goal is to validate the results of Clemm and Eckert with ours.

      @Misc{            c-sedbf-20,
        author        = {Mehmet Cakir},
        title         = {{Simulation-Based Evaluation of a Delay-Based Forwarding
                        Concept}},
        howpublished  = {OMNeT++ Community Summit 2020},
        month         = oct,
        year          = 2020,
        abstract      = {Quality-of-Service (QoS) mechanisms can prioritize a
                        particular network flow with IntServ. Clemm and Eckert
                        propose Latency-Based Forwarding (LBF) as a novel approach
                        to provide support for high-precision latency objectives.
                        It prioritizes traffic with introducing packet metadata
                        which carries latency objectives. With that metadata
                        different actions will be taken at network nodes. A
                        Proof-of-Concept has been developed using Big Packet
                        Protocol (BPP). So in contrast to IntServ LBF supports
                        prioritizing specific packets. The purpose is to provide
                        fairness among different applications. For example packets
                        that aren't urgent as others can be chosen sent later as
                        the urgent ones. Clemm and Eckert contacted us to enable
                        further investigations for the LBF mechanism with OMNeT++.
                        We want to compare our simulation results to the emulation
                        results. The goal is to validate the results of Clemm and
                        Eckert with ours.},
        note          = {Talk},
        groups        = {own, publications, simulation, delay-based forwarding},
        langid        = {english}
      }
    • Randolf Rotermund. Performanzanalyse von SDN-Controllern für Ethernet-basierte Kommunikationsarchitekturen im Fahrzeug. Jul. 2020, Bachelorthesis. Hochschule für Angewandte Wissenschaften Hamburg.
      [Abstract], [Fulltext Document (pdf)], [Bibtex]

      Diese Arbeit beschäftigt sich mit der Analyse und Evaluation von SDN-Controllern, die voraussichtlich in modernen Fahrzeugen mit Ethernet als Kommunikationsarchitektur eingebaut werden. Die Analyse erfolgt in drei Evaluationsschritten. Anfangs werden vier SDN-Controller mittels einer Anforderungsanalyse ausgewählt. Der zweite Schritt beinhaltet, die Performanzanalyse, die mittels einer Zusammenstellung von Metriken durchgeführt wird. Abschließend wird der SDN-Controller mit den besten Ergebnissen bei der Performanzanalyse in einem realen Fallbeispiel genutzt. In diesem Fallbeispiel werden mögliche Anwendungsgebiete und Schwächen von SDN-Controllern in einem Fahrzeugbordnetzwerk deutlich gemacht. Die Anforderungsanalyse hat gezeigt, dass die SDN Controller aus der Auswahl nicht alle kritischen Anforderungen erfüllen konnten. Die Ergebnisse der Performanzanalyse machen deutlich, dass SDN-Controller in der Lage sind innerhalb der zeitlichen Einschränkungen von Fahrzeugen zu agieren. Bei einem Ausfall würden diese für die zeitlichen Verhältnisse in einem Fahrzeug trotzdem zu lange brauchen. Das Fallbeispiel hat gezeigt, dass in einem realen Umfeld einige fehlende Anforderungen, durch Applikationen erfüllt werden können. Das Zeitverhalten bei einem Neustart oder Ausfall des Controllers ist dementsprechend der einzige ausschlaggebende Grund, der den Einbau in ein Fahrzeug verhindert.

      @MastersThesis{   r-psdnc-20,
        author        = {Randolf Rotermund},
        title         = {{Performanzanalyse von SDN-Controllern f{\"u}r
                        Ethernet-basierte Kommunikationsarchitekturen im Fahrzeug}},
        month         = jul,
        year          = 2020,
        school        = {Hochschule f{\"u}r Angewandte Wissenschaften Hamburg},
        address       = {Hamburg},
        abstract      = {Diese Arbeit besch{\"a}ftigt sich mit der Analyse und
                        Evaluation von SDN-Controllern, die voraussichtlich in
                        modernen Fahrzeugen mit Ethernet als
                        Kommunikationsarchitektur eingebaut werden. Die Analyse
                        erfolgt in drei Evaluationsschritten. Anfangs werden vier
                        SDN-Controller mittels einer Anforderungsanalyse
                        ausgew{\"a}hlt. Der zweite Schritt beinhaltet, die
                        Performanzanalyse, die mittels einer Zusammenstellung von
                        Metriken durchgef{\"u}hrt wird. Abschlie{\ss}end wird der
                        SDN-Controller mit den besten Ergebnissen bei der
                        Performanzanalyse in einem realen Fallbeispiel genutzt. In
                        diesem Fallbeispiel werden m{\"o}gliche Anwendungsgebiete
                        und Schw{\"a}chen von SDN-Controllern in einem
                        Fahrzeugbordnetzwerk deutlich gemacht. Die
                        Anforderungsanalyse hat gezeigt, dass die SDN Controller
                        aus der Auswahl nicht alle kritischen Anforderungen
                        erf{\"u}llen konnten. Die Ergebnisse der Performanzanalyse
                        machen deutlich, dass SDN-Controller in der Lage sind
                        innerhalb der zeitlichen Einschr{\"a}nkungen von Fahrzeugen
                        zu agieren. Bei einem Ausfall w{\"u}rden diese f{\"u}r die
                        zeitlichen Verh{\"a}ltnisse in einem Fahrzeug trotzdem zu
                        lange brauchen. Das Fallbeispiel hat gezeigt, dass in einem
                        realen Umfeld einige fehlende Anforderungen, durch
                        Applikationen erf{\"u}llt werden k{\"o}nnen. Das
                        Zeitverhalten bei einem Neustart oder Ausfall des
                        Controllers ist dementsprechend der einzige
                        ausschlaggebende Grund, der den Einbau in ein Fahrzeug verhindert.},
        type          = {bachelorsthesis},
        entrysubtype  = {bachelorsthesis},
        groups        = {own, thesis, sdn, automotive, performance-analysis},
        langid        = {ngerman}
      }
    • Sebastian Szancer. Concept of a V2X Application-Level Gateway with Context-sensitive Semantic Analysis of Application Data - Hauptprojekt. May. 2020,
      [Abstract], [Fulltext Document (pdf)], [Bibtex]

      Modern cars communicate with a variety of entities ranging from other vehicles and infrastructure, such as traffic lights, to Internet-based services running on remote servers. This V2X communication enables the realisation of innovative functionality such as ''over the air'' ECU software updates, optimised navigation and route planning or coordinated autonomous driving. It is necessary that V2X communication is appropriately secured, especially since it includes safety-critical communication. This can be done with a V2X Security Gateway in the vehicle, which serves as a proxy for vehicle-internal services communicating with the outside world and ensures cryptographic security as well as security on the internet-, transport- and application layer. A central component of such a V2X Security Gateway is the V2X Application-Level Gateway, which ensures security on the application layer, including a context-sensitive semantic analysis of application data. It also realises the proxy-functionality and ensures cryptographic security. This paper presents a concept and prototype implementation of such a V2X Application-Level Gateway for IP-based traffic. The implementation was evaluated with the V2X Application-Level Gateway software run on an Intel NUC integrated in a test network representing an internal vehicle network. In this network, consisting of an Edgecore SDN switch and Intel NUCs and Raspberry Pis representing vehicle ECUs, the scenario of remotely controlling the vehicle trunk was simulated.

      @TechReport{      s-vacsa-20,
        author        = {Sebastian Szancer},
        title         = {{Concept of a V2X Application-Level Gateway with
                        Context-sensitive Semantic Analysis of Application Data -
                        Hauptprojekt}},
        month         = may,
        year          = 2020,
        institution   = {CoRE Research Group, Hochschule f{\"u}r Angewandte
                        Wissenschaften Hamburg},
        abstract      = {Modern cars communicate with a variety of entities ranging
                        from other vehicles and infrastructure, such as traffic
                        lights, to Internet-based services running on remote
                        servers. This V2X communication enables the realisation of
                        innovative functionality such as ''over the air'' ECU
                        software updates, optimised navigation and route planning
                        or coordinated autonomous driving. It is necessary that V2X
                        communication is appropriately secured, especially since it
                        includes safety-critical communication. This can be done
                        with a V2X Security Gateway in the vehicle, which serves as
                        a proxy for vehicle-internal services communicating with
                        the outside world and ensures cryptographic security as
                        well as security on the internet-, transport- and
                        application layer. A central component of such a V2X
                        Security Gateway is the V2X Application-Level Gateway,
                        which ensures security on the application layer, including
                        a context-sensitive semantic analysis of application data.
                        It also realises the proxy-functionality and ensures
                        cryptographic security. This paper presents a concept and
                        prototype implementation of such a V2X Application-Level
                        Gateway for IP-based traffic. The implementation was
                        evaluated with the V2X Application-Level Gateway software
                        run on an Intel NUC integrated in a test network
                        representing an internal vehicle network. In this network,
                        consisting of an Edgecore SDN switch and Intel NUCs and
                        Raspberry Pis representing vehicle ECUs, the scenario of
                        remotely controlling the vehicle trunk was simulated.},
        groups        = {own, seminar, security},
        langid        = {english}
      }
    • Jonas Schäufler. Anomaly detection of attacks on LIDAR based automotive perception systems - Hauptprojekt. Mar. 2020,
      [Fulltext Document (pdf)], [Bibtex]
      @TechReport{      s-adalb-20,
        author        = {Jonas Sch{\"a}ufler},
        title         = {{Anomaly detection of attacks on LIDAR based automotive
                        perception systems - Hauptprojekt}},
        month         = mar,
        year          = 2020,
        institution   = {CoRE Research Group, Hochschule f{\"u}r Angewandte
                        Wissenschaften Hamburg},
        groups        = {own, seminar, security},
        langid        = {english}
      }
    • Kai Steffen Wienberg. Implementierung und Evaluation einer Time-Sensitive Software-Defined Networking Architektur für den Automobilbereich. Feb. 2020, Bachelorthesis. Hochschule für Angewandte Wissenschaften Hamburg.
      [Abstract], [Fulltext Document (pdf)], [Bibtex]

      In dieser Bachelorarbeit wird eine Applikation zur Konfiguration eines Time-Sensitive Software-Defined Networking (TSSDN)-Switches konzeptioniert und implementiert. Daraufhin wird anhand verschiedener Testarchitekturen und Testfälle evaluiert, ob TSSDN und der Switch die Anforderungen im Automobilbereich erfüllen können. Durch genaue Messungen der Latenz und Berechnung des Jitters wird ermittelt, wie sich Cross-Traffic auf priorisierte Nachrichten auswirkt und ob durch Scheduling der Nachrichten maximale Laufzeiten garantiert werden können.

      @MastersThesis{   w-ietsn-20,
        author        = {Kai Steffen Wienberg},
        title         = {{Implementierung und Evaluation einer Time-Sensitive
                        Software-Defined Networking Architektur f{\"u}r den
                        Automobilbereich}},
        month         = feb,
        year          = 2020,
        school        = {Hochschule f{\"u}r Angewandte Wissenschaften Hamburg},
        address       = {Hamburg},
        abstract      = {In dieser Bachelorarbeit wird eine Applikation zur
                        Konfiguration eines Time-Sensitive Software-Defined
                        Networking (TSSDN)-Switches konzeptioniert und
                        implementiert. Daraufhin wird anhand verschiedener
                        Testarchitekturen und Testf{\"a}lle evaluiert, ob TSSDN und
                        der Switch die Anforderungen im Automobilbereich
                        erf{\"u}llen k{\"o}nnen. Durch genaue Messungen der Latenz
                        und Berechnung des Jitters wird ermittelt, wie sich
                        Cross-Traffic auf priorisierte Nachrichten auswirkt und ob
                        durch Scheduling der Nachrichten maximale Laufzeiten
                        garantiert werden k{\"o}nnen.},
        type          = {bachelorsthesis},
        entrysubtype  = {bachelorsthesis},
        groups        = {own, thesis, tsn, sdn},
        langid        = {ngerman}
      }
    • Mehmet Cakir. Evaluation dienstorientierter Kommunikation in automobilen Zonalarchitekturen. Jan. 2020, Bachelorthesis. Hochschule für Angewandte Wissenschaften Hamburg.
      [Abstract], [Fulltext Document (pdf)], [Slides (pdf)], [Bibtex]

      In Automobilnetzwerken steigt mit zunehmender Anzahl von Netzwerkkomponenten der Bandbreitenbedarf, wodurch Ethernet Bussysteme verdrängt. Dienstorientierte Architekturen verringern die Komplexität und können mit Dienstgüteverhandlungen heterogene Anforderungen erfüllen. Diese Arbeit evaluiert mithilfe einer praxisnahen Simulationsumgebung eine dienstorientierte Middleware mit dynamischer Dienstgüteverhandlung. Die Middleware und eine Netzwerkbeschreibungssprache werden erweitert, sowie das Zeitverhalten der Middleware untersucht. Zeitliche Anforderungen in heterogenen Autonetzwerken werden eingehalten und die Setup-Time liegt deutlich unter den Anforderungen.

      @MastersThesis{   c-edkaz-20,
        author        = {Mehmet Cakir},
        title         = {{Evaluation dienstorientierter Kommunikation in
                        automobilen Zonalarchitekturen}},
        month         = jan,
        year          = 2020,
        school        = {Hochschule f{\"u}r Angewandte Wissenschaften Hamburg},
        address       = {Hamburg},
        abstract      = {In Automobilnetzwerken steigt mit zunehmender Anzahl von
                        Netzwerkkomponenten der Bandbreitenbedarf, wodurch Ethernet
                        Bussysteme verdr{\"a}ngt. Dienstorientierte Architekturen
                        verringern die Komplexit{\"a}t und k{\"o}nnen mit
                        Dienstg{\"u}teverhandlungen heterogene Anforderungen
                        erf{\"u}llen. Diese Arbeit evaluiert mithilfe einer
                        praxisnahen Simulationsumgebung eine dienstorientierte
                        Middleware mit dynamischer Dienstg{\"u}teverhandlung. Die
                        Middleware und eine Netzwerkbeschreibungssprache werden
                        erweitert, sowie das Zeitverhalten der Middleware
                        untersucht. Zeitliche Anforderungen in heterogenen
                        Autonetzwerken werden eingehalten und die Setup-Time liegt
                        deutlich unter den Anforderungen.},
        type          = {bachelorsthesis},
        entrysubtype  = {bachelorsthesis},
        groups        = {own, thesis, simulation},
        langid        = {ngerman}
      }